Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Network Security

ISSN: 1816--353X
Publisher: Femto Technique


ADD TO MY LIST
 
A New Model Based Encryption Mechanism With Time Stamp and Acknowledgement Support PDF available

Author(s): A. V. N. Krishna | A. Vinaya Babu
Volume: 11
Issue: 3
Year: 2010
Phishing Secrets: History, Effects, and Countermeasures PDF available

Author(s): Antonio San Martino | Xavier Perramon
Volume: 11
Issue: 3
Year: 2010
Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves PDF available

Author(s): Sameh M. Shohdy | Ashraf B. El-Sisi | Nabil Ismail
Volume: 11
Issue: 3
Year: 2010
Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves PDF available

Author(s): Zhixiong Chen | Li Xu | Chenhuang Wu
Volume: 11
Issue: 3
Year: 2010
Performance Evaluation of Mobility Speed over MANET Routing Protocols PDF available

Author(s): Yasser Kamal Hassan | Mohamed Hashim Abd El-Aziz | Ahmed Safwat Abd El-Radi
Volume: 11
Issue: 3
Year: 2010
A Novel Digital Envelope Approach for A Secure E-Commerce Channel PDF available

Author(s): Ramachandran Ganesan | Mohan Gobi | Kanniappan Vivekanandan
Volume: 11
Issue: 3
Year: 2010
On the Security Cost of Interval Multicast PDF available

Author(s): Weifeng Chen | Ye Sun | Anthony S. Pyzdrowski
Volume: 10
Issue: 3
Year: 2010
An Enhanced Remote User Authentication Scheme with Smart Card PDF available

Author(s): Manoj Kumar
Volume: 10
Issue: 3
Year: 2010
Dynamic Key Cryptography and Applications PDF available

Author(s): Huy Hoang Ngo | Xianping Wu | Phu Dung Le | Campbell Wilson | Balasubramaniam Srinivasan
Volume: 10
Issue: 3
Year: 2010
How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys? PDF available

Author(s): Quoc-Cuong Le | Patrick Bellot
Volume: 9
Issue: 3
Year: 2009
Security and Trust in Digital Rights Management: A Survey PDF available

Author(s): Zhiyong Zhang | Qingqi Pei | Jianfeng Ma | Lin Yang
Volume: 9
Issue: 3
Year: 2009
Analysis of Two Types Deniable Authentication Protocols PDF available

Author(s): Haibo Tian | Xiaofeng Chen | Yong Ding
Volume: 9
Issue: 3
Year: 2009
An Overall Cost-effective Authentication Technique for the Global Mobility Network PDF available

Author(s): Chang-Kuo Yeh | Wei-Bin Lee
Volume: 9
Issue: 3
Year: 2009
Knapsack Based ECC Encryption and Decryption PDF available

Author(s): R. Rajaram Ramasamy | M. Amutha Prabakar | M. Indra Devi | M. Suguna
Volume: 9
Issue: 3
Year: 2009
Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks PDF available

Author(s): Moon-Chuen Lee | Yi-Jun He | Zhaole Chen
Volume: 9
Issue: 3
Year: 2009
Toward a Practical Packet Marking Approach for IP Traceback PDF available

Author(s): Chao Gong | Kamil Sarac
Volume: 8
Issue: 3
Year: 2009
Policy-driven and Content-based Web Services Security Gateway PDF available

Author(s): Zein Radwan | Camille Gaspard | Ayman Kayssi | Ali Chehab
Volume: 8
Issue: 3
Year: 2009
Performance Analysis of Soft Computing Based Anomaly Detectors PDF available

Author(s): N. Srinivasan | V. Vaidehi
Volume: 7
Issue: 3
Year: 2008
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior PDF available

Author(s): Xin Tang | Constantine N. Manikopoulos | Sotirios G. Ziavras
Volume: 7
Issue: 3
Year: 2008
On Cipher Design Based on Switchable Controlled Operations PDF available

Author(s): Nikolay A. Moldovyan
Volume: 7
Issue: 3
Year: 2008
Multiplicative Forward-Secure Threshold Signature Scheme PDF available

Author(s): Sherman S. M. Chow | H. W. Go | Lucas C. K. Hui | S. M. Yiu
Volume: 7
Issue: 3
Year: 2008
Probabilistic Analysis and Verification of the ASW Protocol using PRISM PDF available

Author(s): Salekul Islam | Mohammad Abu Zaid
Volume: 7
Issue: 3
Year: 2008
Tamper Resistant Software Through Intent Protection PDF available

Author(s): Alec Yasinsac | J. Todd McDonald
Volume: 7
Issue: 3
Year: 2008
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks PDF available

Author(s): Ashok Kumar Das
Volume: 7
Issue: 3
Year: 2008
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing PDF available

Author(s): Shengbao Wang | Zhenfu Cao | Haiyong Bao
Volume: 7
Issue: 3
Year: 2008
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching PDF available

Author(s): Yeung Siu Fung | John C.S. Lui | David K.Y. Yau
Volume: 7
Issue: 3
Year: 2008
A Fragile Associative Watermarking on 2D Barcode for Data Authentication PDF available

Author(s): Jau-Ji Shen | Po-Wei Hsu
Volume: 7
Issue: 3
Year: 2008
Improved Security Mechanism for Mobile IPv6 PDF available

Author(s): Jing Li | Po Zhang | Srinivas Sampalli
Volume: 6
Issue: 3
Year: 2008
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method PDF available

Author(s): Satoshi Kurosawa | Hidehisa Nakayama | Nei Kato | Abbas Jamalipour | Yoshiaki Nemoto
Volume: 5
Issue: 3
Year: 2007
Elliptic Curve Cryptography Based Wireless Authentication Protocol PDF available

Author(s): Liu Yongliang | Wen Gao | Hongxun Yao | Xinghua Yu
Volume: 5
Issue: 3
Year: 2007
A Biometric Identity Based Signature Scheme PDF available

Author(s): Andrew Burnett | Fergus Byrne | Tom Dowling | Adam Duffy
Volume: 5
Issue: 3
Year: 2007
A Policy-Oriented Language for Expressing Security Specifications PDF available

Author(s): Carlos Ribeiro | Paulo Ferreira
Volume: 5
Issue: 3
Year: 2007
Efficient Directory Harvest Attacks and Countermeasures PDF available

Author(s): Boldizsár Bencsáth | István Vajda
Volume: 5
Issue: 3
Year: 2007
A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes PDF available

Author(s): Yongwei Wang | Venkata C. Giruka | Mukesh Singhal
Volume: 5
Issue: 3
Year: 2007
Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms PDF available

Author(s): Nawal El-Fishawy | Osama M. Abu Zaid
Volume: 5
Issue: 3
Year: 2007
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes PDF available

Author(s): Tianjie Cao | Xianping Mao
Volume: 4
Issue: 3
Year: 2007
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies PDF available

Author(s): Debasis Giri | Parmeshwary Dayal Srivastava
Volume: 4
Issue: 3
Year: 2007
Evolutionary Design of Intrusion Detection Programs PDF available

Author(s): Ajith Abraham | Crina Grosan | Carlos Martin-Vide
Volume: 4
Issue: 3
Year: 2007
Privacy-Preserving Data Mining in Electronic Surveys PDF available

Author(s): Justin Zhan | Stan Matwin
Volume: 4
Issue: 3
Year: 2007
A Novel Approach to Hide Credentials PDF available

Author(s): Zhensong Liao | Hai Jin | Deqin Zou | Weizhong Qiang
Volume: 4
Issue: 3
Year: 2007
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection PDF available

Author(s): Zonghua Zhang | Hong Shen | Yingpeng Sang
Volume: 4
Issue: 3
Year: 2007
Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner PDF available

Author(s): Willy Susilo | Hiroaki Kikuchi
Volume: 4
Issue: 3
Year: 2007
ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications PDF available

Author(s): Shameem Ahmed | Moushumi Sharmin | Sheikh Iqbal Ahamed
Volume: 4
Issue: 3
Year: 2007
LFSR-based Signatures with Message Recovery PDF available

Author(s): Xiangxue Li | Dong Zheng | Kefei Chen
Volume: 4
Issue: 3
Year: 2007
Mobility Management with Distributed AAA Architecture PDF available

Author(s): Lin-huang Chang | Che Lin Lo | Jui Jen Lo | Wei Ting Liu | hou Chen Yang
Volume: 4
Issue: 3
Year: 2007
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration PDF available

Author(s): Khin Mi Mi Aung | Kiejin Park | Jong Sou Park
Volume: 3
Issue: 3
Year: 2006
Authentication and Key Agreement Protocols Preserving Anonymity PDF available

Author(s): Kumar V. Mangipudi | Rajendra S. Katti | Huirong Fu
Volume: 3
Issue: 3
Year: 2006
Alert Correlation for Extracting Attack Strategies PDF available

Author(s): Bin Zhu | Ali A. Ghorbani
Volume: 3
Issue: 3
Year: 2006
Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions PDF available

Author(s): Shijun Xiang | Jiwu Huang
Volume: 3
Issue: 3
Year: 2006
Security on Generalized Feistel Scheme with SP Round Function PDF available

Author(s): Wenling Wu | Wentao Zhang | Dongdai Lin
Volume: 3
Issue: 3
Year: 2006
Security in Pervasive Computing: Current Status and Open Issues PDF available

Author(s): Munirul Haque | Sheikh Iqbal Ahamed
Volume: 3
Issue: 3
Year: 2006
Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control PDF available

Author(s): Deholo Nali | Carlisle Adams | Ali Miri
Volume: 1
Issue: 3
Year: 2005
The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection PDF available

Author(s): Zhuowei Li | Amitabha Das
Volume: 1
Issue: 3
Year: 2005
On the Security of Yuan et al.'s Undeniable Signature Scheme PDF available

Author(s): Wei Zhao
Volume: 11
Issue: 3
Year: 2010
Formal Specification of Common Criteria Based Access Control Policy Model PDF available

Author(s): Manpreet Singh | Manjeet S. Patterh
Volume: 11
Issue: 3
Year: 2010
Comment on Wu et al.'s Server-aided Verification Signature Schemes PDF available

Author(s): Zhiwei Wang | Licheng Wang | Yixian Yang | Zhengming Hu
Volume: 10
Issue: 3
Year: 2010
LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Networks PDF available

Author(s): M. Razvi Doomun | K. M. Sunjiv Soyjaudah
Volume: 10
Issue: 3
Year: 2010
A Provably Secure and Efficient Strong Designated Verifier Signature Scheme PDF available

Author(s): Fuw-Yi Yang | Cai-Ming Liao
Volume: 10
Issue: 3
Year: 2010
Evaluating The Performance of Symmetric Encryption Algorithms PDF available

Author(s): Diaa Salama Abd Elminaam | Hatem Mohamed Abdual Kader | Mohiy Mohamed Hadhoud
Volume: 10
Issue: 3
Year: 2010
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network PDF available

Author(s): Ramanarayana Kandikattu | Lillykutty Jacob
Volume: 10
Issue: 3
Year: 2010
Analysis of Venkaiah et al.'s AES Design PDF available

Author(s): Jorge Nakahara
Volume: 9
Issue: 3
Year: 2009
Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks PDF available

Author(s): Abedelaziz Mohaisen | DaeHun Nyang | KyungHee Lee
Volume: 8
Issue: 3
Year: 2009
Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack PDF available

Author(s): Chunbo Ma | Jun Ao
Volume: 8
Issue: 3
Year: 2009
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature PDF available

Author(s): Hu Xiong | Zhiguang Qin | Fagen Li
Volume: 8
Issue: 3
Year: 2009
A Related Key Attack on the Feistel Type Block Ciphers PDF available

Author(s): Ali Bagherzandi | Mahmoud Salmasizadeh | Javad Mohajeri
Volume: 8
Issue: 3
Year: 2009
Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality PDF available

Author(s): Dan Lu | Yoshitake Kobayashi | Ken Nakayama | Mamoru Maekawa
Volume: 7
Issue: 3
Year: 2008
Proof of Forward Security for Password-based Authenticated Key Exchange PDF available

Author(s): Shuhua Wu | Yuefei Zhu
Volume: 7
Issue: 3
Year: 2008
A Key Management Scheme for Hierarchical Access Control in Group Communication PDF available

Author(s): Qiong Zhang | Yuke Wang | Jason P. Jue
Volume: 7
Issue: 3
Year: 2008
Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability PDF available

Author(s): Ali Bagherzandi | Javad Mohajeri | Mahmoud Salmasizadeh
Volume: 6
Issue: 3
Year: 2008
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation PDF available

Author(s): Men Long | Chwan-Hwa "John" Wu | J. David Irwin
Volume: 6
Issue: 3
Year: 2008
An Effective Anomaly Detection Method in SMTP Traffic PDF available

Author(s): Hao Luo | Binxing Fang | Xiaochun Yun | Zhigang Wu
Volume: 6
Issue: 3
Year: 2008
Wavelet-based Real Time Detection of Network Traffic Anomalies PDF available

Author(s): Chin-Tser Huang | Sachin Thareja | Yong-June Shin
Volume: 6
Issue: 3
Year: 2008
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine PDF available

Author(s): Zaiqiang Liu | Dongdai Lin | Fengdeng Guo
Volume: 6
Issue: 3
Year: 2008
A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting PDF available

Author(s): Tony Thomas | Arbind Kumar Lal
Volume: 6
Issue: 3
Year: 2008
Formal Protocol Design of ESIKE Based on Authentication Tests PDF available

Author(s): Rui Jiang | Aiqun Hu | Jianhua Li
Volume: 6
Issue: 3
Year: 2008
Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol PDF available

Author(s): Theodore Stergiou | Dimitrios L. Delivasilis
Volume: 5
Issue: 3
Year: 2007
Formal Specification and Verification of the Intrusion-Tolerant Enclaves Protocol PDF available

Author(s): Mohamed Layouni | Jozef Hooman | Sofiène Tahar
Volume: 5
Issue: 3
Year: 2007
A Sequential Distinguisher for Covert Channel Identification PDF available

Author(s): K. P. Subbalakshmi | Rajarathnam Chandramouli | Nagarajan Ranganathan
Volume: 5
Issue: 3
Year: 2007
Secure Logging for Irrefutable Administration PDF available

Author(s): Paolo Dal Checco | Francesco Bergadano | Davide Cavagnino | Pasquale Andrea Nesta | Michele Miraglia | Pier Luigi Zaccone
Volume: 4
Issue: 3
Year: 2007
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings PDF available

Author(s): Manik Lal Das | Ashutosh Saxena | Deepak B. Phatak
Volume: 4
Issue: 3
Year: 2007
Related-Mode Attacks on CTR Encryption Mode PDF available

Author(s): Dayin Wang | Dongdai Lin | Wenling Wu
Volume: 4
Issue: 3
Year: 2007
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification PDF available

Author(s): Rongxing Lu | Zhenfu Cao | Jun Shao
Volume: 4
Issue: 3
Year: 2007
Secure Internet Applications Based on Mobile Agents PDF available

Author(s): Cungang Yang
Volume: 2
Issue: 3
Year: 2006
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy PDF available

Author(s): Zhi Zhou | Kin Choomg Yow
Volume: 2
Issue: 3
Year: 2006
A Hash-based Strong Password Authentication Protocol with User Anonymity PDF available

Author(s): Kumar V. Mangipudi | Rajendra S. Katti
Volume: 2
Issue: 3
Year: 2006
A Directed Signature Scheme Based on RSA Assumption PDF available

Author(s): Rongxing Lu | Zhenfu Cao
Volume: 2
Issue: 3
Year: 2006
Setup-driving Verifiably Committed Signatures Within Standard Complexity Mode PDF available

Author(s): Huafei Zhu
Volume: 2
Issue: 3
Year: 2006
Reversible Watermarking: Current Status and Key Issues PDF available

Author(s): Jen-Bang Feng | Iuon-Chang Lin | Chwei-Shyong Tsai | Yen-Ping Chu
Volume: 2
Issue: 3
Year: 2006
The Wireless Application Protocol PDF available

Author(s): Dave Singelee | Bart Preneel
Volume: 1
Issue: 3
Year: 2005
Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols PDF available

Author(s): Kim-Kwang Raymond Choo
Volume: 1
Issue: 3
Year: 2005
Co-operative Private Equality Test PDF available

Author(s): Ronghua Li | Chuankun Wu
Volume: 1
Issue: 3
Year: 2005
Two Attacks on the Wu-Hsu User Identification Scheme PDF available

Author(s): Cheng-Chi Lee
Volume: 1
Issue: 3
Year: 2005
Threshold Signatures: Current Status and Key Issues PDF available

Author(s): Min-Shiang Hwang | Ting-Yi Chang
Volume: 1
Issue: 3
Year: 2005
A Proxy Blind Signature Scheme over Braid Groups PDF available

Author(s): Girraj Kumar Verma
Volume: 9
Issue: 3
Year: 2009
On a Family of Minimal Candidate One-way Functions and One-way Permutations PDF available

Author(s): Danilo Gligoroski
Volume: 8
Issue: 3
Year: 2009
Agent-based Intrusion Detection For Network-based Application PDF available

Author(s): Jianping Zeng | Donghui Guo
Volume: 8
Issue: 3
Year: 2009
Weak Composite Diffie-Hellman PDF available

Author(s): Kooshiar Azimian | Javad Mohajeri | Mahmoud Salmasizadeh
Volume: 7
Issue: 3
Year: 2008
Multi-Designated Verifiers Signatures Revisited PDF available

Author(s): Sherman S. M. Chow
Volume: 7
Issue: 3
Year: 2008
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings PDF available

Author(s): Rongxing Lu | Zhenfu Cao
Volume: 5
Issue: 3
Year: 2007
Is There a Shortage of Primes for Cryptography? PDF available

Author(s): Samuel S. Wagstaff, Jr.
Volume: 3
Issue: 3
Year: 2006
Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards PDF available

Author(s): Ren-Chiun Wang | Chou-Chen Yang
Volume: 3
Issue: 3
Year: 2006
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz PDF available

Author(s): Mustapha Hedabou
Volume: 3
Issue: 3
Year: 2006
Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach PDF available

Author(s): Rama Murthy Garimella
Volume: 3
Issue: 3
Year: 2006
A Memory Symptom-based Virus Detection Approach PDF available

Author(s): Hsien-Chou Liao | Yi-Hsiang Wang
Volume: 2
Issue: 3
Year: 2006
Algorithms and Approaches of Proxy Signature: A Survey PDF available

Author(s): Manik Lal Das | Ashutosh Saxena | Deepak B Phatak
Volume: 9
Issue: 3
Year: 2009
On Security of An Efficient Nonce-based Authentication Scheme for SIP PDF available

Author(s): Cheng-Chi Lee
Volume: 9
Issue: 3
Year: 2009
Edon-R, An Infinite Family of Cryptographic Hash Functions PDF available

Author(s): Danilo Gligoroski | Smile Markovski | Ljupco Kocarev
Volume: 8
Issue: 3
Year: 2009
LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption PDF available

Author(s): Somanath Tripathy | Sukumar Nandi
Volume: 8
Issue: 3
Year: 2009
Provably Secure Identity-based Threshold Key Escrow from Pairing PDF available

Author(s): Yu Long | Zheng Gong | Kefei Chen | Shengli Liu
Volume: 8
Issue: 3
Year: 2009
On the Security of ``Golden'' Cryptography PDF available

Author(s): angel Marti­n del Rey | Gerardo Rodri­guez Sa¡nchez
Volume: 7
Issue: 3
Year: 2008
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying PDF available

Author(s): Depeng Li | Srinivas Sampalli
Volume: 6
Issue: 3
Year: 2008
Distributed Paillier Plaintext Equivalence Test PDF available

Author(s): Pei-Yih Ting | Xiao-Wei Huang
Volume: 6
Issue: 3
Year: 2008
Improving the Novikov and Kiselev User Authentication Scheme PDF available

Author(s): Min-Ho Kim | Cetin Kaya Koc
Volume: 6
Issue: 3
Year: 2008
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying PDF available

Author(s): Depeng Li
Volume: 6
Issue: 3
Year: 2008
Comments on "Improved Efficient Remote User Authentication Schemes" PDF available

Author(s): Manik Lal Das
Volume: 6
Issue: 3
Year: 2008
A Self-Concealing Mechanism for Authentication of Portable Communication Systems

Author(s): Wei-Bin Lee
Volume: 6
Issue: 3
Year: 2008
Attacks on An ISO/IEC 11770-2 Key Establishment Protocol PDF available

Author(s): Zhaohui Cheng | Richard Comley
Volume: 3
Issue: 3
Year: 2006
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems PDF available

Author(s): Alberto Peinado Dominguez
Volume: 3
Issue: 3
Year: 2006
Ideal Secret Sharing Schemes from Permutations PDF available

Author(s): Josef Pieprzyk | Xian-Mo Zhang
Volume: 2
Issue: 3
Year: 2006
A Class of Data-Dependent Operations PDF available

Author(s): Nikolay A. Moldovyan | Alexander A. Moldovyan | Michael A. Eremeev
Volume: 2
Issue: 3
Year: 2006
Comment on the Public Key Substitution Attacks PDF available

Author(s): Xiaofeng Chen | Fangguo Zhang | Baodian Wei
Volume: 1
Issue: 3
Year: 2005
On the Authentication of the User from the Remote Autonomous Object PDF available

Author(s): Amit K Awasthi
Volume: 1
Issue: 3
Year: 2005
Automatic Multi-step Attack Pattern Discovering PDF available

Author(s): Li Wang | Ali Ghorbani | Yao Li
Volume: 10
Issue: 2
Year: 2010
Lightweight PKI for WSN uPKI PDF available

Author(s): Benamar Kadri | Mohammed Feham | Abdallah M'hamed
Volume: 10
Issue: 2
Year: 2010
MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks PDF available

Author(s): Hongwei Li | Atam P. Dhawan
Volume: 10
Issue: 2
Year: 2010
Verifiable Attribute Based Encryption PDF available

Author(s): Qiang Tang | Dongyao Ji
Volume: 10
Issue: 2
Year: 2010
Computing the Modular Inverse of a Polynomial Function over GF(2^P) Using Bit Wise Operation PDF available

Author(s): Rajaram Ramasamy | Amutha Prabakar Muniyandi
Volume: 10
Issue: 2
Year: 2010
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks PDF available

Author(s): Aikaterini Mitrokotsa | Nikos Komninos | Christos Douligeris
Volume: 10
Issue: 2
Year: 2010
Integrated Intrusion Detection System Using Soft Computing PDF available

Author(s): S Selvakani Kandeeban | Rengan S Rajesh
Volume: 10
Issue: 2
Year: 2010
Design Universal Security Scheme for Broadband Router PDF available

Author(s): Xiaozhuo Gu | Jianzu Yang
Volume: 10
Issue: 2
Year: 2010
Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods PDF available

Author(s): Güenther Lackner | Udo Payer | Peter Teufl
Volume: 9
Issue: 2
Year: 2009
Defending Network-based Services Against Denial of Service Attacks PDF available

Author(s): Jinu Kurian | Kamil Sarac
Volume: 9
Issue: 2
Year: 2009
Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance PDF available

Author(s): Cong Jin | Jun Liu | Qinghua Deng
Volume: 9
Issue: 2
Year: 2009
Queue-based Group Key Agreement Protocol PDF available

Author(s): Sunghyuck Hong
Volume: 9
Issue: 2
Year: 2009
Energy-efficient Hybrid Key Management Protocol for Wireless Sensor Networks PDF available

Author(s): Tim Landstra | Sarangapani Jagannathan | Maciej Zawodniok
Volume: 9
Issue: 2
Year: 2009
Authentication Protocol Using Quantum Superposition States PDF available

Author(s): Yoshito Kanamori | Seong-Moo Yoo | Don A. Gregory | Frederick T. Sheldon
Volume: 9
Issue: 2
Year: 2009
Receiver-deniable Public-Key Encryption PDF available

Author(s): Maged Hamada Ibrahim
Volume: 8
Issue: 2
Year: 2009
Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n) PDF available

Author(s): Brian King
Volume: 8
Issue: 2
Year: 2009
Rank Functions Based Inference System for Group Key Management Protocols Verification PDF available

Author(s): Amjad Gawanmeh | Adel Bouhoula | Sofiene Tahar
Volume: 8
Issue: 2
Year: 2009
A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems PDF available

Author(s): Hasan Mohammed Hasan Husei | Bayoumi I. Bayoumi | Fathy Saad Holail | Bahaa Eldin M. Hasan | Mohammed Z. Abd El-Mageed
Volume: 8
Issue: 2
Year: 2009
Efficient Dealer-Less Threshold Sharing of Standard RSA PDF available

Author(s): Maged Hamada Ibrahim
Volume: 8
Issue: 2
Year: 2009
Virtual Invisible Disk Design for Information System Security PDF available

Author(s): Faisal Nabi
Volume: 8
Issue: 2
Year: 2009
Ordered Semiring-based Trust Establish Model with Risk Evaluating PDF available

Author(s): Mingwu Zhang | Bo Yang | Shenglin Zhu | Wenzheng Zhang
Volume: 8
Issue: 2
Year: 2009
A New Type of Designated Confirmer Signatures for a Group of Individuals PDF available

Author(s): Baodian Wei | Fangguo Zhang | Xiaofeng Chen
Volume: 7
Issue: 2
Year: 2008
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords PDF available

Author(s): Hai Tao | Carlisle Adams
Volume: 7
Issue: 2
Year: 2008
ID-based Weak Blind Signature From Bilinear Pairings PDF available

Author(s): Ze-mao Zhao
Volume: 7
Issue: 2
Year: 2008
A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability PDF available

Author(s): Tarun Bhaskar | Narasimha Kamath B | Soumyo D Moitra
Volume: 7
Issue: 2
Year: 2008
Fault Tolerant Weighted Voting Algorithms PDF available

Author(s): Azad Azadmanesh | Alireza Farahani | Lotfi Najjar
Volume: 7
Issue: 2
Year: 2008
A New General Transparency Model for Block-based Watermarking Method PDF available

Author(s): Fangjun Huang
Volume: 7
Issue: 2
Year: 2008
A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security PDF available

Author(s): Debasis Giri | P. D. Srivastava
Volume: 7
Issue: 2
Year: 2008
Repairing Efficient Threshold Group Signature Scheme PDF available

Author(s): Zuhua Shao
Volume: 7
Issue: 2
Year: 2008
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks PDF available

Author(s): Eyad Taqieddin | S. Jagannathan | Ann Miller
Volume: 7
Issue: 2
Year: 2008
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy PDF available

Author(s): Shengbao Wang | Zhenfu Cao | Feng Cao
Volume: 7
Issue: 2
Year: 2008
Improvement on Nominative Proxy Signature Schemes PDF available

Author(s): Zuo-Wen Tan
Volume: 7
Issue: 2
Year: 2008
Scalable Delay-constrained Multicast Group Key Management PDF available

Author(s): Said Gharout | Yacine Challal | Abdelmadjid Bouabdallah
Volume: 7
Issue: 2
Year: 2008
Cryptanalysis of Syverson's Rational Exchange Protocol PDF available

Author(s): Almudena Alcaide | uan M. Estevez-Tapiador | Julio C. Hernandez-Castro | Arturo Ribagorda
Volume: 7
Issue: 2
Year: 2008
A Reputation-based Trust Management System for P2P Networks PDF available

Author(s): Ali Aydin Selçuk | Ersin Uzun | Mark Resat Pariente
Volume: 6
Issue: 2
Year: 2008
Security Requirements for RFID Computing Systems PDF available

Author(s): Xiaolan Zhang | Brian King
Volume: 6
Issue: 2
Year: 2008
Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme PDF available

Author(s): Mohammed Misbahuddin | C. Shoba Bindu
Volume: 6
Issue: 2
Year: 2008
SurePath: An Approach to Resilient Anonymous Routing PDF available

Author(s): Yingwu Zhu | Yiming Hu
Volume: 6
Issue: 2
Year: 2008
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems PDF available

Author(s): Zine-Eddine Abid | Wei Wang
Volume: 6
Issue: 2
Year: 2008
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme PDF available

Author(s): Fang-Ping Chiang | Yi-Mien Lin | Ya-Fen Chang
Volume: 6
Issue: 2
Year: 2008
Solutions to Key Exposure Problem in Ring Signature PDF available

Author(s): Joseph K. Liu | Duncan S. Wong
Volume: 6
Issue: 2
Year: 2008
Security Measures and Weaknesses of the GPRS Security Architecture PDF available

Author(s): Christos Xenakis
Volume: 6
Issue: 2
Year: 2008
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System PDF available

Author(s): Mohamad Eid | Hassan Artail | Ayman Kayssi | Ali Chehab
Volume: 6
Issue: 2
Year: 2008
Application-Specific Key Release Scheme from Biometrics PDF available

Author(s): Ong Thian Song | Andrew Teoh Beng Jin | David Chek Ling Ngo
Volume: 6
Issue: 2
Year: 2008
A Multi-band Wavelet Watermarking Scheme PDF available

Author(s): Xiangui Kang | Wenjun Zeng | Jiwu Huang
Volume: 6
Issue: 2
Year: 2008
A Genetic Algorithm for Cryptanalysis of DES-8 PDF available

Author(s): Hasan Mohammed Hasan Husein | Bayoumi I. Bayoumi | Fathy Saad Holail | Bahaa Eldin M. Hasan | Mohammed Z. Abd El-Mageed
Volume: 5
Issue: 2
Year: 2007
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices PDF available

Author(s): Chetan Nanjunda Mathur | K. P. Subbalakshmi
Volume: 5
Issue: 2
Year: 2007
A More Efficient Instantiation of Witness-Indistinguishable Signature PDF available

Author(s): Joseph K. Liu | Duncan S. Wong
Volume: 5
Issue: 2
Year: 2007
A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems PDF available

Author(s): Lirong Dai | Kendra Cooper
Volume: 5
Issue: 2
Year: 2007
Enhanced DSR for MANET with Improved Secured Route Discovery and QoS PDF available

Author(s): Anil Rawat | Prakash Dattatraya Vyavahare | Ashwani Kumar Ramani
Volume: 5
Issue: 2
Year: 2007
Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks PDF available

Author(s): Wei Ren | Hai Jin | Dit-Yan Yeung | Mei Yang
Volume: 4
Issue: 2
Year: 2007
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems PDF available

Author(s): Magdy Saeb | Meer Hamza | Ahmed EL-Shikh
Volume: 4
Issue: 2
Year: 2007
Integrity of mobile agents: a new approach PDF available

Author(s): Aneta Zwierko | Zbigniew Kotulski
Volume: 4
Issue: 2
Year: 2007
New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key PDF available

Author(s): Jiguo Li | Shuhong Wang
Volume: 4
Issue: 2
Year: 2007
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings PDF available

Author(s): Amit K Awasthi | Sunder Lal
Volume: 4
Issue: 2
Year: 2007
Distributed Cryptographic Computing on Grid PDF available

Author(s): Zhonghua Jiang | Dongdai Lin | Lin Xu | Lei lin
Volume: 4
Issue: 2
Year: 2007
Broadcast Authentication With Preferred Verifiers PDF available

Author(s): Mahalingam Ramkumar
Volume: 4
Issue: 2
Year: 2007
How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis PDF available

Author(s): Pairat Thorncharoensri | Tianbing Xia | Yi Mu
Volume: 4
Issue: 2
Year: 2007
Improving Indirect Key Management Scheme of Access Hierarchies PDF available

Author(s): Brian J. Cacic | Ruizhong Wei
Volume: 4
Issue: 2
Year: 2007
Security Analysis of Double Length Compression Function Based on Block Cipher PDF available

Author(s): Pin Lin | Wen-Ling Wu | Chuan-Kun Wu
Volume: 4
Issue: 2
Year: 2007
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks PDF available

Author(s): Asad Amir Pirzada | Chris McDonald
Volume: 3
Issue: 2
Year: 2006
Personality Trait Based Simulation Model of the E-mail System PDF available

Author(s): Mark Jyn-Huey Lim | Michael Negnevitsky | Jacky Hartnett
Volume: 3
Issue: 2
Year: 2006
Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks PDF available

Author(s): Hamdy S Soliman | Mohammed Omari
Volume: 3
Issue: 2
Year: 2006
Joint Sparse Form of Window Three for Koblitz Curve PDF available

Author(s): Yong Ding | Kwok-Wo Wong | Yu-Min Wang
Volume: 2
Issue: 2
Year: 2006
New Class of Cryptographic Primitives and Cipher Design for Networks Security PDF available

Author(s): Nikolay Moldovyan | A. A. Moldovyan | M. A. Eremeev | N. Sklavos
Volume: 2
Issue: 2
Year: 2006
Active Trial-and-error Attack on SASC Protocols PDF available

Author(s): Heeyoul Kim | Younho Lee | Seong-Min Hong | Hyunsoo Yoon
Volume: 2
Issue: 2
Year: 2006
A Study of Micro-payment Based on One-way Hash Chain PDF available

Author(s): Min-Shiang Hwang | Pei-Chen Sung
Volume: 2
Issue: 2
Year: 2006
Cryptanalysis of a New Efficient MAKEP for Wireless Communications PDF available

Author(s): Jau-Ji Shen | Ching-Ying Lin | Hung-Wen Yang
Volume: 1
Issue: 2
Year: 2005
Self-healing Group Key Distribution PDF available

Author(s): Muhammad Junaid Bohio | Ali Miri
Volume: 1
Issue: 2
Year: 2005
Access Control in Networks Hierarchy: Implementation of Key Management Protocol PDF available

Author(s): Nicolas Sklavos | Odysseas Koufopavlou
Volume: 1
Issue: 2
Year: 2005
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types PDF available

Author(s): Diaa Salama Abdul Minaam | Hatem M. Abdual-Kader | Mohiy Mohamed Hadhoud
Volume: 11
Issue: 2
Year: 2010
Efficient Cancelable Biometric Key Generation Scheme for Cryptography PDF available

Author(s): Sunil V. K. Gaddam | Manohar Lal
Volume: 11
Issue: 2
Year: 2010
Accelerating RSA Encryption Using Random Precalculations PDF available

Author(s): Loránd Szőllősi | Tamás Marosits | Gábor Fehér
Volume: 10
Issue: 2
Year: 2010
Provable Partial Key Escrow PDF available

Author(s): Kooshiar Azimian | Javad Mohajeri | Mahmoud Salmasizadeh | Samuel S. Wagstaff, Jr.
Volume: 10
Issue: 2
Year: 2010
Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences PDF available

Author(s): Tongjiang Yan | Xiaoni Du | Shuqing Li | Guozhen Xiao
Volume: 7
Issue: 2
Year: 2008
A Simple User Authentication Scheme for Grid Computing PDF available

Author(s): Rongxing Lu | Zhenfu Cao | Zhenchuan Chai | Xiaohui Liang
Volume: 7
Issue: 2
Year: 2008
Customizing Cellular Message Encryption Algorithm PDF available

Author(s): Debdeep Mukhopadhyay | Dipanwita RoyChowdhury
Volume: 7
Issue: 2
Year: 2008
Further Improvements of Fast Encryption Algoirthm for Multimedia PDF available

Author(s): Depeng Li | Srinivas Sampalli
Volume: 7
Issue: 2
Year: 2008
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes PDF available

Author(s): L. Herna¡ndez Encinas | A. Marti­n del Rey | J. Munoz Masquue
Volume: 7
Issue: 2
Year: 2008
Attacking LCCC Batch Verification of RSA Signatures PDF available

Author(s): Martin Stanek
Volume: 6
Issue: 2
Year: 2008
An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups PDF available

Author(s): Atul Chaturvedi | Sunder Lal
Volume: 6
Issue: 2
Year: 2008
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture PDF available

Author(s): Arshad Aziz | Nassar Ikram
Volume: 5
Issue: 2
Year: 2007
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme PDF available

Author(s): Zichen Li | C. F. Chong | Lucas Chi-Kwong Hui | Siu-Ming Yiu | K. P. Chow | Wai-Wan Tsang | H. W. Chan | Kelvin K. H. Pun
Volume: 5
Issue: 2
Year: 2007
A Traitor Tracing Scheme Based on the RSA System PDF available

Author(s): Bo Yang | Hua Ma | Shenglin Zhu
Volume: 5
Issue: 2
Year: 2007
Security Proof of the Original SOK-IBS Scheme PDF available

Author(s): Xiao-Ming Lu | Deng-Guo Feng
Volume: 5
Issue: 2
Year: 2007
Code-based Ring Signature Scheme PDF available

Author(s): Dong Zheng | Xiangxue Li | Kefei Chen
Volume: 5
Issue: 2
Year: 2007
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach PDF available

Author(s): Afrand Agah | Sajal K. Das
Volume: 5
Issue: 2
Year: 2007
Stream or Block Cipher for Securing VoIP? PDF available

Author(s): Ashraf D. Elbayoumy | Simon J. Shepherd
Volume: 5
Issue: 2
Year: 2007
Novel Secure Communication Protocol for Conditional Access System PDF available

Author(s): Liu Yongliang | Xiaolin Yang | Hongxun Yao | Wen Gao
Volume: 5
Issue: 2
Year: 2007
Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme PDF available

Author(s): Minho Kim | Cetin Kaya Koc
Volume: 4
Issue: 2
Year: 2007
Improved Efficient Remote User Authentication Schemes PDF available

Author(s): Xiaojian Tian | Robert W. Zhu | Duncan S. Wong
Volume: 4
Issue: 2
Year: 2007
A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices PDF available

Author(s): Wassim Itani | Ayman Kayssi | Ali Chehab | Camille Gaspard
Volume: 3
Issue: 2
Year: 2006
An Access Control System with Time-constraint Using Support Vector Machines PDF available

Author(s): Chin-Chen Chang | Iuon-Chang Lin | Chia-Te Liao
Volume: 2
Issue: 2
Year: 2006
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols PDF available

Author(s): Jolyon Clulow
Volume: 2
Issue: 2
Year: 2006
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks PDF available

Author(s): Animesh Patcha | Jung-Min Park
Volume: 2
Issue: 2
Year: 2006
Construction of Dynamic Threshold Decryption Scheme from Pairing PDF available

Author(s): Yu Long | Ke-Fei Chen
Volume: 2
Issue: 2
Year: 2006
Research on Intrusion Detection and Response: A Survey PDF available

Author(s): Peyman Kabiri | Ali Ghorbani
Volume: 1
Issue: 2
Year: 2005
A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme PDF available

Author(s): Minho Kim | Çtin Kaya Koç
Volume: 1
Issue: 2
Year: 2005
Authenticated Encryption Schemes: Current Status and Key Issues PDF available

Author(s): Min-Shiang Hwang | Chi-Yu Liu
Volume: 1
Issue: 2
Year: 2005
An MSS Based on the Elliptic Curve Cryptosystem PDF available

Author(s): Hemlal Sahu | Birendra Kumar Sharma
Volume: 11
Issue: 2
Year: 2010
A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol PDF available

Author(s): Jie Liu | Jianhua Li
Volume: 11
Issue: 2
Year: 2010
Acceleration of the Elliptic Cryptography with Vector Finite Fields PDF available

Author(s): Nikolay A. Moldovyan
Volume: 9
Issue: 2
Year: 2009
An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm PDF available

Author(s): Thomas Chardin | Raphaël Marinier
Volume: 9
Issue: 2
Year: 2009
Detecting Scanners: Empirical Assessment on a 3G Network PDF available

Author(s): Vincenzo Falletta | Fabio Ricciato
Volume: 9
Issue: 2
Year: 2009
A New Involutory MDS Matrix for the AES PDF available

Author(s): Jorge Nakahara Jr | Élcio Abrahão
Volume: 9
Issue: 2
Year: 2009
Remarks on Zhang-Kim's Key Authentication Scheme PDF available

Author(s): Jie Liu | Jianhua Li
Volume: 8
Issue: 2
Year: 2009
Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks PDF available

Author(s): Chun-Ta Li | Yen-Ping Chu
Volume: 8
Issue: 2
Year: 2009
An Efficient Verifiably Encrypted Signature Scheme without Random Oracles PDF available

Author(s): Yang Ming | Yumin Wang
Volume: 8
Issue: 2
Year: 2009
On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal PDF available

Author(s): Fouz Sattar | Muid Mufti
Volume: 8
Issue: 2
Year: 2009
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks PDF available

Author(s): Biju Issac
Volume: 8
Issue: 2
Year: 2009
ID-based Signcryption Scheme with (t,n) Shared Unsigncryption PDF available

Author(s): Fagen Li | Xiangjun Xin | Yupu Hu
Volume: 3
Issue: 2
Year: 2006
On the Security of Signature Scheme with Message Recovery and Its Application PDF available

Author(s): Eun-Jun Yoon | Kee-Young Yoo
Volume: 3
Issue: 2
Year: 2006
A Fast Semantically Secure Public Key Cryptosystem Based on Factoring PDF available

Author(s): Sahadeo Padhye | Birendra Kumar Sharma
Volume: 3
Issue: 2
Year: 2006
Security Analysis of Some Batch Verifying Signatures from Pairings PDF available

Author(s): Tianjie Cao | Dongdai Lin | Rui Xue
Volume: 3
Issue: 2
Year: 2006
Password Authentication Schemes: Current Status and Key Issues PDF available

Author(s): Chwei-Shyong Tsai | Cheng-Chi Lee | Min-Shiang Hwang
Volume: 3
Issue: 2
Year: 2006
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling PDF available

Author(s): Adam J. Rocke | Ronald F. DeMara
Volume: 2
Issue: 2
Year: 2006
Traffic Filtering and Routing in Partially-Hidden Networks PDF available

Author(s): D. Nali, A. Miri | C. Adams
Volume: 2
Issue: 2
Year: 2006
Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications PDF available

Author(s): Hsien-Chu Wu | Chi-Yu Liu | Shu-Fen Chiou
Volume: 1
Issue: 2
Year: 2005
Blind Collective Signature Protocol Based on Discrete Logarithm Problem PDF available

Author(s): Nikolay A. Moldovyan | Alexander A. Moldovyan
Volume: 11
Issue: 2
Year: 2010
A New Secure Remote User Authentication Scheme with Smart Cards PDF available

Author(s): Manoj Kumar
Volume: 11
Issue: 2
Year: 2010
Node-failure Tolerance of Topology in Wireless Sensor Networks PDF available

Author(s): Liang-Min Wang | Jian-Feng Ma | Yan-Bo Guo
Volume: 7
Issue: 2
Year: 2008
A Comprehensive Secure VoIP Solution PDF available

Author(s): Ashraf D. Elbayoumy | Simon Shepherd
Volume: 5
Issue: 2
Year: 2007
Research on Data Hiding Capacity PDF available

Author(s): Zhensong Liao | Yan Huang | Chisong Li
Volume: 5
Issue: 2
Year: 2007
An Effective Method to Implement Group Signature with Revocation PDF available

Author(s): He Ge
Volume: 5
Issue: 2
Year: 2007
A Forward-Secure User Authentication Scheme with Smart Cards PDF available

Author(s): Bin Wang | Zheng-Quan Li
Volume: 3
Issue: 2
Year: 2006
Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object PDF available

Author(s): Cheng-Ying Yang | Cheng-Chi Lee | Shu-Yin Hsiao
Volume: 1
Issue: 2
Year: 2005
The Structure of a Signature via the Net PDF available

Author(s): Chuen Chuan Huang | Chuen-Der Huang | Shin Ya Huang
Volume: 11
Issue: 2
Year: 2010
Speeding Scalar Multiplication of Elliptic Curve over GF(2^mn) PDF available

Author(s): Ding Yong | Yin-Fang Hong | Wei-Tao Wang | Yuan-Yuan Zhou | Xiao-Yang Zhao
Volume: 11
Issue: 2
Year: 2010
Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor PDF available

Author(s): Mingwu Zhang | Bo Yang | Wenzheng Zhang | Tsuyoshi Takagi
Volume: 12
Issue: 1
Year: 2011
Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks PDF available

Author(s): Peyman Kabiri | Mehran Aghaei
Volume: 12
Issue: 1
Year: 2011
Fault Attack and Countermeasures on Pairing Based Cryptography PDF available

Author(s): Santosh Ghosh | Debdeep Mukhopadhyay | Dipanwita Roy Chowdhury
Volume: 12
Issue: 1
Year: 2011
New Real Time Multicast Authentication Protocol PDF available

Author(s): Riham Abdellatif | Heba Kamal Aslan | Salwa H. Elramly
Volume: 12
Issue: 1
Year: 2011
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC PDF available

Author(s): R. Rajaram Ramasamy | M. Amutha Prabakar
Volume: 12
Issue: 1
Year: 2011
Efficient Nonce-based Authentication Scheme for Session Initiation Protocol PDF available

Author(s): Jia Lun Tsai
Volume: 9
Issue: 1
Year: 2009
Resisting Traitors in Linkable Democratic Group Signatures PDF available

Author(s): Maged Hamada Ibrahim
Volume: 9
Issue: 1
Year: 2009
Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security PDF available

Author(s): M. Razvi Doomun | KMS Soyjaudah
Volume: 9
Issue: 1
Year: 2009
An Efficient Two-phase Spam Filtering Method Based on E-mails Categorization PDF available

Author(s): Jyh-Jian Sheu
Volume: 9
Issue: 1
Year: 2009
Sybil Nodes Detection Based on Received Signal Strength Variations within VANET PDF available

Author(s): Mohamed Salah Bouassida | Gilles Guette | Mohamed Shawky | Bertrand Ducourthial
Volume: 9
Issue: 1
Year: 2009
A Method for Obtaining Deniable Public-Key Encryption PDF available

Author(s): Maged Hamada Ibrahim
Volume: 8
Issue: 1
Year: 2009
A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach PDF available

Author(s): Mohamed M. Nasreldin Rasslan | Yasser H. Dakroury | Heba K. Aslan
Volume: 8
Issue: 1
Year: 2009
A Dynamic Authentication Scheme for Mobile Transactions PDF available

Author(s): Sathish Babu B. | Pallapa Venkataram
Volume: 8
Issue: 1
Year: 2009
Identity-based Universal Designated Verifier Signature Proof System PDF available

Author(s): Xiaofeng Chen | Guomin Chen | Fangguo Zhang | Baodian Wei | Yi Mu
Volume: 8
Issue: 1
Year: 2009
Anonymity in Wireless Broadcast Networks PDF available

Author(s): Matt Blaze | John Ioannidis | Angelos D. Keromytis | Tal Malkin | Avi Rubin
Volume: 8
Issue: 1
Year: 2009
An Architecture for An XML Enabled Firewall PDF available

Author(s): Andrew Blyth
Volume: 8
Issue: 1
Year: 2009
Software Implementations of Elliptic Curve Cryptography PDF available

Author(s): Zhijie Jerry Shi | Hai Yun
Volume: 7
Issue: 1
Year: 2008
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks PDF available

Author(s): Ye Zhu | Xinwen Fu | Riccardo Bettati
Volume: 7
Issue: 1
Year: 2007
Efficient User Authentication and Key Agreement with User Privacy Protection PDF available

Author(s): Wen-Shenq Juang | Jing-Lin Wu
Volume: 7
Issue: 1
Year: 2008
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing PDF available

Author(s): Maged Hamada Ibrahim
Volume: 7
Issue: 1
Year: 2008
Towards a Framework for Federated Global Identity Management PDF available

Author(s): Mehrdad Naderi | Jawed Siddiqi | Babak Akhgar | Wolfgang Orth | Norbert Meyer | Miika Tuisku | Gregor Pipan
Volume: 7
Issue: 1
Year: 2008
Detecting and Preventing IP-spoofed Distributed DoS Attacks PDF available

Author(s): Yao Chen | Shantanu Das | Pulak Dhar | Abdulmotaleb El Saddik | Amiya Nayak
Volume: 7
Issue: 1
Year: 2008
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks PDF available

Author(s): Falko Dressler
Volume: 7
Issue: 1
Year: 2008
Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach PDF available

Author(s): Debabrata Nayak | Deepak B. Phatak | Ashutosh Saxena
Volume: 7
Issue: 1
Year: 2008
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme PDF available

Author(s): Da-Zhi Sun | Zhen-Fu Cao
Volume: 6
Issue: 1
Year: 2008
Performance Improvements on the Network Level Security Protocols PDF available

Author(s): Tarek S. Sobh | Ashraf Elgohary | M. Zaki
Volume: 6
Issue: 1
Year: 2008
Re-visiting the One-Time Pad PDF available

Author(s): Nithin Nagaraj | Vivek Vaidya | Prabhakar G. Vaidya
Volume: 6
Issue: 1
Year: 2008
Short Designated Verifier Signature Scheme and Its Identity-based Variant PDF available

Author(s): Xinyi Huang | Willy Susilo | Yi Mu | Futai Zhang
Volume: 6
Issue: 1
Year: 2008
Group Key Management in MANETs PDF available

Author(s): Mohamed Salah Bouassida | Isabelle Chrisment | Olivier Festor
Volume: 6
Issue: 1
Year: 2008
Baseline Profile Stability for Network Anomaly Detection PDF available

Author(s): Yoohwan Kim | Ju-Yeon Jo | Kyunghee Kim Suh
Volume: 6
Issue: 1
Year: 2008
Secure Two-Way Transfer of Measurement Data PDF available

Author(s): Marko Hassinen | Maija Marttila-Kontio | Mikko Saesmaa | Heli Tervo
Volume: 6
Issue: 1
Year: 2008
A Secure Group Key Management Scheme for Wireless Cellular Systems PDF available

Author(s): Hwayoung Um | Edward J. Delp
Volume: 6
Issue: 1
Year: 2008
A Study on the Security of Privacy Homomorphism PDF available

Author(s): Yu Yu | Jussipekka Leiwo | Benjamin Premkumar
Volume: 6
Issue: 1
Year: 2008
Constructing Efficient Certificateless Public Key Encryption with Pairing PDF available

Author(s): Yijuan Shi | Jianhua Li | Jianjun Shi
Volume: 6
Issue: 1
Year: 2008
A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast PDF available

Author(s): Qingyu Zhang | Kenneth L. Calvert
Volume: 6
Issue: 1
Year: 2008
Statistical Attack Resilient Data Hiding PDF available

Author(s): Palak K. Amin | Ning Liu | Koduvayur P. Subbalakshmi
Volume: 5
Issue: 1
Year: 2007
SeReRoM: Secured Reliable Routing Scheme for Multicasting PDF available

Author(s): Rajavelu Srinivasan | V. Vaidehi | K. N. Srivathsan | L. Ramesh Babu | C. Karunagaran
Volume: 5
Issue: 1
Year: 2007
Free Forms + CRM     Affiliate Program